{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:46:40Z","timestamp":1743076000991,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":27,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_18","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"407-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security Evaluation and Common Criteria"],"prefix":"10.1007","author":[{"given":"Tony","family":"Boswell","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"18_CR1","unstructured":"Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model, Version 3.1 Revision 3, CCMB-2009-07-001, July 2009."},{"key":"18_CR2","unstructured":"Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Components, Version 3.1 Revision 3, CCMB-2009-07-002, July 2009."},{"key":"18_CR3","unstructured":"Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Components, Version 3.1 Revision 3, CCMB-2009-07-003, July 2009."},{"key":"18_CR4","unstructured":"Common Methodology for Information Technology Security Evaluation: Evaluation Methodology, v3.1 Release 3, CCMB-2009-07-004, July 2009."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Mayes K, Markantonakis K (eds) (2008), Smart Cards, Tokens, Security and Applications, Springer.","DOI":"10.1007\/978-0-387-72198-9"},{"key":"18_CR6","unstructured":"The Application of CC to Integrated Circuits, version 3.0 revision 1, CCDB-2009-03-002, March 2009 [Online] http:\/\/www.commoncriteriaportal.org\/supporting\/."},{"key":"18_CR7","unstructured":"Requirements to perform Integrated Circuit Evaluations, version 1.0 revision 1, CCDB-2009-09-001, September 2009 [Online] http:\/\/www.commoncriteriaportal.org\/supporting\/."},{"key":"18_CR8","unstructured":"Application of Attack Potential to Smart Cards, version 2.7 revision 1, CCDB-2009-03-001, March 2009 [Online] http:\/\/www.commoncriteriaportal.org\/supporting\/."},{"key":"18_CR9","unstructured":"Composite product evaluation for Smart Cards and similar devices, version 1.0 revision 1, CCDB-2007-09-001, September 2007 [Online] http:\/\/www.commoncriteriaportal.org\/supporting\/"},{"key":"18_CR10","unstructured":"Eurosmart, Security IC Platform Protection Profile, version 1.0, BSI-PP-0035, 15 June 2007, [Online] http:\/\/www.commoncriteriaportal.org\/files\/ppfiles\/pp0035b.pdf"},{"key":"18_CR11","unstructured":"Government Computer News, Engineer shows how to crack a \u201csecure\u201d TPM chip, [Online] http:\/\/gcn.com\/articles\/2010\/02\/02\/black-hat-chip-crack-020210.aspx, (accessed 2 June 2011)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Boswell T, Smart card security evaluation: Community solutions to intractable problems, Information Security Technical Report, Volume 14 issue 2, May 2009, pp57-69.","DOI":"10.1016\/j.istr.2009.06.002"},{"key":"18_CR13","unstructured":"NIST, Security Requirements For Cryptographic Modules, FIPS PUB 140\u20132, issued 25 May 2001, with change notices as at 12 March 2002 (The original FIPS 140 standard was FIPS 140\u20131; this was superseded by FIPS140-2, and FIPS 140\u20133 is in draft at the time of writing. In this chapter, FIPS 140 is used as a general name for the scheme.)."},{"key":"18_CR14","unstructured":"NIST, Derived Test Requirements for FIPS PUB 140\u20132, draft of 4 January 2011."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Assurance Continuity: CCRA Requirements, CCIMB-2004-02-009, version 1.0, February 2004, [Online] http:\/\/www.commoncriteriaportal.org\/files\/supplements\/2004-02-009.pdf.","DOI":"10.1088\/1126-6708\/2004\/02\/009"},{"key":"18_CR16","unstructured":"Payment Card Industry (PCI), PIN Transaction Security (PTS) Point of Interaction (POI) Modular Security Requirements, version 3.0, April 2010, [Online] https:\/\/www.pcisecuritystandards.org\/documents\/pci_pts_poi_sr.pdf."},{"key":"18_CR17","unstructured":"Payment Card Industry (PCI), PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire, version 3.0, April 2010, [Online] https:\/\/www.pcisecuritystandards.org\/documents\/pci_pts_poi_vq.pdf."},{"key":"18_CR18","unstructured":"Common Approval Scheme, Point of Interaction Protection Profile, version 2.0, 26 November 2010, [Online] http:\/\/www.ssi.gouv.fr\/IMG\/certificat\/ANSSI-CC-cible_PP-2010-10en.pdf."},{"key":"18_CR19","unstructured":"Information Assurance Directorate, Protection Profile for USB Flash Drives, version 1.0, 1 December 2011, [Online] http:\/\/www.niap-ccevs.org\/pp\/pp_usb_fd_v1.0.pdf."},{"key":"18_CR20","unstructured":"Trusted Computing Group, Trusted Computing Group Protection Profile PC Client specific Trusted Platform Module TPM Family 1.2; Level 2, version 1.1, 10 July 2008, [Online] http:\/\/www.commoncriteriaportal.org\/files\/ppfiles\/pp0030b.pdf"},{"key":"18_CR21","unstructured":"GlobalPlatform, The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market, February 2011, [Online] http:\/\/www.globalplatform.org\/documents\/GlobalPlatform_TEE_White_Paper_Feb2011.pdf."},{"key":"18_CR22","unstructured":"Global Platform, GlobalPlatform Device Technology TEE Client API Specification, version 0.17, 27 April 2010, [Online] http:\/\/www.globalplatform.org\/specificationsdevice.asp."},{"key":"18_CR23","unstructured":"ARM, Building a Secure System using TrustZone Technology, issue C, April 2009, [Online] http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf."},{"key":"18_CR24","unstructured":"Description of the CMVP, and list of CMVP validated modules, [Online] http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html."},{"key":"18_CR25","unstructured":"Mutual Recognition Agreement of Information Technology Security Evaluation Certificates, version 3.0, January 2010, [Online] http:\/\/sogisportal.org\/."},{"key":"18_CR26","unstructured":"International Common Criteria website, [Online] http:\/\/www.commoncriteriaportal.org."},{"key":"18_CR27","unstructured":"PCI Security Standards council website, [Online] https:\/\/www.pcisecuritystandards.org."}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T17:41:44Z","timestamp":1675964504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_18","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}